The Strategies of Service Delivery Adopted by Private Security Firms in Crime Prevention in Nairobi County, Kenya
Abstract
Keywords
Full Text:
PDFReferences
Abdullahi, M. S, Shehu, U. R., & Usman, B. M (2019). Impact of Information Communication Technology On Organisational Productivity In The Nigeria Banking Industry: Empirical Evidence. Noble International Journal of Business and Management Research, 3(1), 1–9.
Ainuddin, R. A., Beamish, P. W., Hulland, J. S., & Rouse, M. J. (2007). Resource attributes and firm performance in international joint ventures. Journal of World Business, 42(1), 47–60. doi: 10.1016/j.jwb.2006.11.001
Albrecht, S., Breidahl, E., & Marty, A. (2018). Organisational resources, organisational engagement climate, and employee engagement. Career Development International, 23(1), 67–85. doi: 10.1108/cdi-04-2017-0064
Barney, J. B. (2018). Why resource-based theory's model of profit appropriation must incorporate a stakeholder perspective. Strategic Management, 39(13), 3305–3325. doi: 10.1002/smj.2949
Kuhns, J., Blevins, K., & Lee, S. (2012). Understanding Decisions to Burglarise from the Offender's Perspective. Retrieved from https://www.researchgate.net/publication/268444817_Understanding_Decisions_to_Burglarize_from_the_Offender%27s_Perspective?channel=doi&linkId=546b48410cf2f5eb18091770&showFulltext=true
Baker, B. (2013). Security Beyond the State: Private Security in International Politics. International Peacekeeping, 20(1), 118–119. doi: 10.1080/13533312.2012.761852
Bures, O., & Carrapico, H. (2016). Private security beyond private military and security companies: exploring diversity within private-public collaborations and its consequences for security governance. Crime, Law and Social Change, 67(3), 229–243. doi: 10.1007/s10611-016-9651-5
Burns, A. J., Roberts, T. L., Posey, C., Bennett, R. J., & Courtney, J. F. (2015). Assessing the role of security education, training, and awareness on insiders' security-related behavior: An expectancy theory approach. In 2015 48th Hawaii International Conference on System Sciences (pp. 3930-3940). doi: 10.1109/hicss.2015.471
Byrne, J., Marx, G. (2019). Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact. Retrieved from https://www.ojp.gov/pdffiles1/nij/238011.pdf
Chinwokwu, E. C. (2018). An assessment of the relationship between private security companies and the police in crime prevention in Lagos Metropolis, Nigeria. International Journal of Police Science & Management, 20(1), 80–93. doi: 10.1177/1461355718756413
Cordner, G. (2017). Evidence-based police education and training in the United States. European Law Enforcement Research Bulletin, 3, 71–78.
Cushen, J., & Thompson, P. (2016). Financialisation and value: why labour and the labour process still matter. Work, Employment & Society, 30(2), 352–365.
Diphoorn, T. (2016). “Surveillance of the Surveillers”: Regulation of the Private Security Industry in South Africa and Kenya. African Studies Review, 59(2), 161–182. doi: 10.1017/asr.2016.31
Ekhomu, O. (2019). Boko Haram. doi: 10.4324/9780203710838
Freilich, J. D., & Newman, G. R. (2013). Providing Opportunities: A Sixth Column for the Techniques of Situational Crime Prevention. Organised Crime, Corruption and Crime Prevention, 33–42. doi: 10.1007/978-3-319-01839-3_5
Githimi, S., Bor, E., & Appolos, M. (2017). How the availability of private security services assist in crime control in Nairobi County, Kenya. Global Journal of Arts, Humanities and Social Sciences, 5(1), 51–61.
Grove, E., Farrell, G., Farrington, D., Johnson, D. (2012). Preventing Repeat Victimisation: A Systematic Review. Retrieved from https://www.researchgate.net/publication/274312621_Preventing_Repeat_Victimization_A_Systematic_Review
Kamenju, J. A., Mwachofi, S., & Wairagu, F. (2003). Terrorised Citizens: Profiling Proliferation of Small Arms and Insecurity in the North Rift Region of Kenya. Nairobi: Security Research and Information Centre.
Kiama, S., & Bor, E. (2015). Private security services and crime control in Karen location, Nairobi County, Kenya. Journal of Humanities and Social Science, 20(10), 84–90.
Willis, J. J., Koper, C. S., & Lum, C. (2018). Technology use and constituting structures: accounting for the consequences of information technology on police organisational change. Policing and Society, 30(5), 483–501. doi: 10.1080/10439463.2018.1557660
Kotler, P., & Keller, K. L. (2016). Marketing Management (15 Global ed.). Essex: Pearson’s Education Limited.
Kumbuti, H. (2013). Use of technology as a strategy by Kenya police in detection of crimes in Nairobi City. Retrieved from http://erepository.uonbi.ac.ke/bitstream/handle/11295/63076/Kambuti_Use%20Of%20Technology%20As%20A%20Strategy%20By%20Kenya%20Police%20In%20Detection%20Of%20Crimes%20In%20Nairobi%20City%20Kumbuti?sequence=1&isAllowed=y
Mkutu, K. A., & Sabala, K. (2007). Private Security Companies in Kenya and Dilemmas for Security. Journal of Contemporary African Studies, 25(3), 391–416. doi: 10.1080/02589000701662442
Mutonyi, G. P., & Sirera, A. (2018). Commercial Security’s’ Effect on Security of Kenyans in Private Venues. Emerging Science Journal, 2(4). doi: 10.28991/esj-2018-01142
Mutonyi, G. P., Masiga, C., & Kilongosi, H. (2020). Commercialised Security and Its Role in Selected Countries’ National Security. Path of Science, 6(7), 2001–2021. doi: 10.22178/pos.60-6
Mutonyi, G., Ann Merecia Sirera, & Mwai, W. (2020). Examining Commercialised Security Industry's Services on National Security in Nairobi County, Kenya. Technium Social Sciences Journal, 8, 710–736. doi: 10.47577/tssj.v8i1.671
Nalla, M. K., Maxwell, S. R., & Mamayek, C. M. (2017). Legitimacy of Private Police in Developed, Emerging, and Transitional Economies. European Journal of Crime, Criminal Law and Criminal Justice, 25(1), 76–100. doi: 10.1163/15718174-25012107
Prenzler, T and Sarre, R (2014). Regulation. In The Handbook of Security Management, edited by Martin Gill. Pages 857–78. London: Palgrave MacMillan.
Prenzler, T., & Sarre, R. (2012). The Evolution of Security Industry Regulations in Australia: A Critique. International Journal for Crime and Justice, 1(1), 38–51.
Ronen, Y. (2010). PRIV-WAR Report. Israel: The use and regulation of private military and security companies in situations of armed conflict. Retrieved from http://psm.du.edu/media/documents/reports_and_stats/think_tanks/privwar_national-report_ronen.pdf
Cunningham, W. C., & Taylor, T. H. (1985). Private security and police in America: the Hallcrest report I. Boston: Butterworth-Heinemann.
Shemesh, A. (2013). Perspective of the Labor Market for security guards in Israel in time of terror attacks 2000–2004. Retrieved from https://ec.europa.eu/eurostat/cros/system/files/NTTS2013fullPaper_179.pdf
Sparrow, M., (2014). Managing the Boundary between Public and Private Policing. New Perspectives in Policing Bulletin. Washington: U. S. Department of Justice, National Institute of Justice.
Office for National Statistics. (2020). Crime in England and Wales: year ending December 2019. Retrieved from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingdecember2019
Te, F., Kadar, C., Brungger, R., & Cvijikj, I. P. (2018). Human versus technology: comparing the Effect of Private Security Patrol and Crime Prevention Information System over the Crime Level and Safety Perception. Retrieved from https://aisel.aisnet.org/ecis2016_rip/48
Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2017). The effectiveness of burglary security devices. Security Journal, 30(2), 646–664. doi: 10.1057/sj.2014.30
United Nations Office on Drugs and Crime. (2014). State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety. Retrieved from https://www.unodc.org/documents/justice-and-prison-reform/Civilian_Private_Security_Services_Ebook.pdf
Wilkie, K. (2013). Private Security Officers and Private Policing in Residential Estates in Hong Kong (Doctoral thesis). Retrieved from https://researchportal.port.ac.uk/files/5925223/Wilkie_Yat_Hung_Kwong_PhD_Thesis_2013.pdf
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Lukalia George Mondela, Ann Merecia Sirera

This work is licensed under a Creative Commons Attribution 4.0 International License.



